Author Archives: 2101704571georgius

Nikto Website Scanner

Nikto is a website scanning tool designed not for stealth, but for quickest result. Nikto has many features such as checking for outdated software versions (PHP, apache, etc), checking for vulnerability and etc.

Posted in Uncategorized | Leave a comment

Vulnerability Exploitation Using Metasploit

The Metasploit framework is a very powerful tool capable of information gathering, vulnerability analysis, exploit vulnerabilities and etc. For a full tutorial, visit https://www.offensive-security.com/metasploit-unleashed/.

Posted in Uncategorized | Leave a comment

Dirb Web Content Scanner

DIRB is a web content scanner used for scanning both hidden and non hidden web objects. It does a dictionary based attack against a web server and checks every response given.

Posted in Uncategorized | Leave a comment

Nmap

Nmap is a network mapping tool used for network discovery. Nmap can get information such as open ports, OS, version and etc. Nmap has a lot of options such as syn scan, udp scan and etc.

Posted in Uncategorized | Leave a comment

Information Gathering Using TheHarvester

TheHarvester is used to gather emails, subdomains, hosts, employee names and etc. The tool is only available in CLI but is very straightforward.

Posted in Uncategorized | Leave a comment

Disclaimer: This blog is used for educational purposes only.

Posted in Uncategorized | Leave a comment

Information Gathering Using Maltego Community Edition

Maltego is a tool used for open-source intelligence and forensics. Unlike most tools, maltego has a GUI and is user friendly.

Posted in Uncategorized | Leave a comment

WordPress Scanning Using WPScan

WPScan is (as the name suggests) for scanning wordpress websites for vulnerabilities. WPScan is both passive and aggressive depending on the setting used. In addition, it can also enumerate users and attempt brute force attacks.

Posted in Uncategorized | Leave a comment

Packet Sniffing using Kali Linux TCPdump

Packet sniffing is one of the many ways to gather information in a network. This method eavesdrops  the target machine by capturing and saving packets from network traffic. Sniffing can be done using TCPdump in  Kali Linux.

Posted in Uncategorized | Leave a comment

Multimedia and Human Computer Interaction Game Guide & Contribution

Game Guide: A guide for a biology themed tower defense. Github Link Team Members: Georgius Farras Diwa

Posted in Uncategorized | Leave a comment